header-logo
Suggest Exploit
vendor:
qdPM
by:
Leon Trappett (thepcn3rd)
8,8
CVSS
HIGH
Password and Connection String Exposure
200
CWE
Product Name: qdPM
Affected Version From: 9.2
Affected Version To: 9.2
Patch Exists: NO
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Ubuntu 20.04 Apache2 Server running PHP 7.4
2021

qdPM 9.2 – DB Connection String and Password Exposure (Unauthenticated)

The password and connection string for the database are stored in a yml file. To access the yml file you can go to http://<website>/core/config/databases.yml file and download.

Mitigation:

Ensure that the yml file is not accessible to unauthenticated users.
Source

Exploit-DB raw data:

# Exploit Title: qdPM 9.2 - DB Connection String and Password Exposure (Unauthenticated)
# Date: 03/08/2021
# Exploit Author: Leon Trappett (thepcn3rd)
# Vendor Homepage: https://qdpm.net/
# Software Link: https://sourceforge.net/projects/qdpm/files/latest/download
# Version: 9.2
# Tested on: Ubuntu 20.04 Apache2 Server running PHP 7.4

The password and connection string for the database are stored in a yml file. To access the yml file you can go to http://<website>/core/config/databases.yml file and download.